Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

Context-aware security for 6G wireless: The role of physical layer security

A Chorti, AN Barreto, S Köpsell, M Zoli… - IEEE …, 2022 - ieeexplore.ieee.org
Sixth generation systems are expected to face new security challenges, while opening up
new frontiers toward context awareness in the wireless edge. The workhorse behind this …

Physical layer security: Authentication, integrity, and confidentiality

M Shakiba-Herfeh, A Chorti, H Vincent Poor - Physical Layer Security, 2021 - Springer
The goal of physical layer security (PLS) is to make use of the properties of the physical
layer—including the wireless communication medium and/or the transceiver hardware—to …

[图书][B] Advanced optical and wireless communications systems

IB Djordjevic - 2018 - Springer
The purpose of this book is to introduce the reader to most advanced topics of (i) wireless
communications,(ii) free-space optical (FSO) communications,(iii) indoor optical wireless …

Authenticated secret key generation in delay-constrained wireless systems

M Mitev, A Chorti, M Reed, L Musavian - EURASIP Journal on Wireless …, 2020 - Springer
With the emergence of 5G low-latency applications, such as haptics and V2X, low-
complexity and low-latency security mechanisms are needed. Promising lightweight …

Centralized and distributed intrusion detection for resource-constrained wireless SDN networks

GAN Segura, A Chorti, CB Margi - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Software-defined networking (SDN) was devised to simplify network management and
automate infrastructure sharing in wired networks. These benefits motivated the application …

A physical layer, zero-round-trip-time, multifactor authentication protocol

M Mitev, M Shakiba-Herfeh, A Chorti, M Reed… - IEEE …, 2022 - ieeexplore.ieee.org
Lightweight physical layer security schemes that have recently attracted a lot of attention
include physical unclonable functions (PUFs), RF fingerprinting/proximity based …

Joint localization-based node authentication and secret key generation

M Srinivasan, S Skaperas, MS Herfeh… - ICC 2022-IEEE …, 2022 - ieeexplore.ieee.org
In this paper, we devise preprocessing schemes to disentangle channel state information
(CSI) into predictable and unpredictable components to simultaneously provide two …

Secure transmission design for cooperative NOMA in the presence of internal eavesdropping

B Su, W Yu, H Liu, A Chorti… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
The application of successive interference cancellation (SIC) introduces critical security risks
to cooperative non-orthogonal multiple access (NOMA) systems in the presence of …

Protecting physical layer secret key generation from active attacks

M Mitev, A Chorti, EV Belmega, HV Poor - Entropy, 2021 - mdpi.com
Lightweight session key agreement schemes are expected to play a central role in building
Internet of things (IoT) security in sixth-generation (6G) networks. A well-established …